diff options
author | jsing <> | 2016-12-30 15:24:51 +0000 |
---|---|---|
committer | jsing <> | 2016-12-30 15:24:51 +0000 |
commit | 1de1c0bc177ccec5368d5886522dfa98af1a69be (patch) | |
tree | 416e29f907ff74b9c6c3e325436c4d8ce8efc005 /src | |
parent | 88ff2e52fac94c4fe54e003e48b26cf5f092fa8f (diff) | |
download | openbsd-1de1c0bc177ccec5368d5886522dfa98af1a69be.tar.gz openbsd-1de1c0bc177ccec5368d5886522dfa98af1a69be.tar.bz2 openbsd-1de1c0bc177ccec5368d5886522dfa98af1a69be.zip |
Expand ASN1_ITEM_rptr macros - no change in generated assembly.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/x509/x509_req.c | 6 | ||||
-rw-r--r-- | src/lib/libcrypto/x509/x_all.c | 104 |
2 files changed, 55 insertions, 55 deletions
diff --git a/src/lib/libcrypto/x509/x509_req.c b/src/lib/libcrypto/x509/x509_req.c index dc4bc2639a..e6fc3c5df8 100644 --- a/src/lib/libcrypto/x509/x509_req.c +++ b/src/lib/libcrypto/x509/x509_req.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x509_req.c,v 1.18 2015/09/30 17:30:16 jsing Exp $ */ | 1 | /* $OpenBSD: x509_req.c,v 1.19 2016/12/30 15:24:51 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -224,7 +224,7 @@ X509_REQ_get_extensions(X509_REQ *req) | |||
224 | return NULL; | 224 | return NULL; |
225 | p = ext->value.sequence->data; | 225 | p = ext->value.sequence->data; |
226 | return (STACK_OF(X509_EXTENSION) *)ASN1_item_d2i(NULL, &p, | 226 | return (STACK_OF(X509_EXTENSION) *)ASN1_item_d2i(NULL, &p, |
227 | ext->value.sequence->length, ASN1_ITEM_rptr(X509_EXTENSIONS)); | 227 | ext->value.sequence->length, &X509_EXTENSIONS_it); |
228 | } | 228 | } |
229 | 229 | ||
230 | /* Add a STACK_OF extensions to a certificate request: allow alternative OIDs | 230 | /* Add a STACK_OF extensions to a certificate request: allow alternative OIDs |
@@ -245,7 +245,7 @@ X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, | |||
245 | at->type = V_ASN1_SEQUENCE; | 245 | at->type = V_ASN1_SEQUENCE; |
246 | /* Generate encoding of extensions */ | 246 | /* Generate encoding of extensions */ |
247 | at->value.sequence->length = ASN1_item_i2d((ASN1_VALUE *)exts, | 247 | at->value.sequence->length = ASN1_item_i2d((ASN1_VALUE *)exts, |
248 | &at->value.sequence->data, ASN1_ITEM_rptr(X509_EXTENSIONS)); | 248 | &at->value.sequence->data, &X509_EXTENSIONS_it); |
249 | if (!(attr = X509_ATTRIBUTE_new())) | 249 | if (!(attr = X509_ATTRIBUTE_new())) |
250 | goto err; | 250 | goto err; |
251 | if (!(attr->value.set = sk_ASN1_TYPE_new_null())) | 251 | if (!(attr->value.set = sk_ASN1_TYPE_new_null())) |
diff --git a/src/lib/libcrypto/x509/x_all.c b/src/lib/libcrypto/x509/x_all.c index 74ff179b65..36c12b80e5 100644 --- a/src/lib/libcrypto/x509/x_all.c +++ b/src/lib/libcrypto/x509/x_all.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: x_all.c,v 1.22 2016/11/04 10:29:19 beck Exp $ */ | 1 | /* $OpenBSD: x_all.c,v 1.23 2016/12/30 15:24:51 jsing Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -76,146 +76,146 @@ | |||
76 | X509 * | 76 | X509 * |
77 | d2i_X509_bio(BIO *bp, X509 **x509) | 77 | d2i_X509_bio(BIO *bp, X509 **x509) |
78 | { | 78 | { |
79 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509), bp, x509); | 79 | return ASN1_item_d2i_bio(&X509_it, bp, x509); |
80 | } | 80 | } |
81 | 81 | ||
82 | int | 82 | int |
83 | i2d_X509_bio(BIO *bp, X509 *x509) | 83 | i2d_X509_bio(BIO *bp, X509 *x509) |
84 | { | 84 | { |
85 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509), bp, x509); | 85 | return ASN1_item_i2d_bio(&X509_it, bp, x509); |
86 | } | 86 | } |
87 | 87 | ||
88 | X509 * | 88 | X509 * |
89 | d2i_X509_fp(FILE *fp, X509 **x509) | 89 | d2i_X509_fp(FILE *fp, X509 **x509) |
90 | { | 90 | { |
91 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509), fp, x509); | 91 | return ASN1_item_d2i_fp(&X509_it, fp, x509); |
92 | } | 92 | } |
93 | 93 | ||
94 | int | 94 | int |
95 | i2d_X509_fp(FILE *fp, X509 *x509) | 95 | i2d_X509_fp(FILE *fp, X509 *x509) |
96 | { | 96 | { |
97 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509), fp, x509); | 97 | return ASN1_item_i2d_fp(&X509_it, fp, x509); |
98 | } | 98 | } |
99 | 99 | ||
100 | X509_CRL * | 100 | X509_CRL * |
101 | d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) | 101 | d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl) |
102 | { | 102 | { |
103 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); | 103 | return ASN1_item_d2i_bio(&X509_CRL_it, bp, crl); |
104 | } | 104 | } |
105 | 105 | ||
106 | int | 106 | int |
107 | i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) | 107 | i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl) |
108 | { | 108 | { |
109 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_CRL), bp, crl); | 109 | return ASN1_item_i2d_bio(&X509_CRL_it, bp, crl); |
110 | } | 110 | } |
111 | 111 | ||
112 | X509_CRL * | 112 | X509_CRL * |
113 | d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) | 113 | d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl) |
114 | { | 114 | { |
115 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); | 115 | return ASN1_item_d2i_fp(&X509_CRL_it, fp, crl); |
116 | } | 116 | } |
117 | 117 | ||
118 | int | 118 | int |
119 | i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) | 119 | i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl) |
120 | { | 120 | { |
121 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_CRL), fp, crl); | 121 | return ASN1_item_i2d_fp(&X509_CRL_it, fp, crl); |
122 | } | 122 | } |
123 | 123 | ||
124 | PKCS7 * | 124 | PKCS7 * |
125 | d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) | 125 | d2i_PKCS7_bio(BIO *bp, PKCS7 **p7) |
126 | { | 126 | { |
127 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); | 127 | return ASN1_item_d2i_bio(&PKCS7_it, bp, p7); |
128 | } | 128 | } |
129 | 129 | ||
130 | int | 130 | int |
131 | i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) | 131 | i2d_PKCS7_bio(BIO *bp, PKCS7 *p7) |
132 | { | 132 | { |
133 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS7), bp, p7); | 133 | return ASN1_item_i2d_bio(&PKCS7_it, bp, p7); |
134 | } | 134 | } |
135 | 135 | ||
136 | PKCS7 * | 136 | PKCS7 * |
137 | d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) | 137 | d2i_PKCS7_fp(FILE *fp, PKCS7 **p7) |
138 | { | 138 | { |
139 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); | 139 | return ASN1_item_d2i_fp(&PKCS7_it, fp, p7); |
140 | } | 140 | } |
141 | 141 | ||
142 | int | 142 | int |
143 | i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) | 143 | i2d_PKCS7_fp(FILE *fp, PKCS7 *p7) |
144 | { | 144 | { |
145 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS7), fp, p7); | 145 | return ASN1_item_i2d_fp(&PKCS7_it, fp, p7); |
146 | } | 146 | } |
147 | 147 | ||
148 | X509_REQ * | 148 | X509_REQ * |
149 | d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) | 149 | d2i_X509_REQ_bio(BIO *bp, X509_REQ **req) |
150 | { | 150 | { |
151 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); | 151 | return ASN1_item_d2i_bio(&X509_REQ_it, bp, req); |
152 | } | 152 | } |
153 | 153 | ||
154 | int | 154 | int |
155 | i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) | 155 | i2d_X509_REQ_bio(BIO *bp, X509_REQ *req) |
156 | { | 156 | { |
157 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_REQ), bp, req); | 157 | return ASN1_item_i2d_bio(&X509_REQ_it, bp, req); |
158 | } | 158 | } |
159 | 159 | ||
160 | X509_REQ * | 160 | X509_REQ * |
161 | d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) | 161 | d2i_X509_REQ_fp(FILE *fp, X509_REQ **req) |
162 | { | 162 | { |
163 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); | 163 | return ASN1_item_d2i_fp(&X509_REQ_it, fp, req); |
164 | } | 164 | } |
165 | 165 | ||
166 | int | 166 | int |
167 | i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) | 167 | i2d_X509_REQ_fp(FILE *fp, X509_REQ *req) |
168 | { | 168 | { |
169 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_REQ), fp, req); | 169 | return ASN1_item_i2d_fp(&X509_REQ_it, fp, req); |
170 | } | 170 | } |
171 | 171 | ||
172 | #ifndef OPENSSL_NO_RSA | 172 | #ifndef OPENSSL_NO_RSA |
173 | RSA * | 173 | RSA * |
174 | d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) | 174 | d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa) |
175 | { | 175 | { |
176 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); | 176 | return ASN1_item_d2i_bio(&RSAPrivateKey_it, bp, rsa); |
177 | } | 177 | } |
178 | 178 | ||
179 | int | 179 | int |
180 | i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) | 180 | i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa) |
181 | { | 181 | { |
182 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPrivateKey), bp, rsa); | 182 | return ASN1_item_i2d_bio(&RSAPrivateKey_it, bp, rsa); |
183 | } | 183 | } |
184 | 184 | ||
185 | RSA * | 185 | RSA * |
186 | d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) | 186 | d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa) |
187 | { | 187 | { |
188 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); | 188 | return ASN1_item_d2i_fp(&RSAPrivateKey_it, fp, rsa); |
189 | } | 189 | } |
190 | 190 | ||
191 | int | 191 | int |
192 | i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) | 192 | i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa) |
193 | { | 193 | { |
194 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPrivateKey), fp, rsa); | 194 | return ASN1_item_i2d_fp(&RSAPrivateKey_it, fp, rsa); |
195 | } | 195 | } |
196 | 196 | ||
197 | RSA * | 197 | RSA * |
198 | d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) | 198 | d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa) |
199 | { | 199 | { |
200 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); | 200 | return ASN1_item_d2i_bio(&RSAPublicKey_it, bp, rsa); |
201 | } | 201 | } |
202 | 202 | ||
203 | int | 203 | int |
204 | i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) | 204 | i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa) |
205 | { | 205 | { |
206 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(RSAPublicKey), bp, rsa); | 206 | return ASN1_item_i2d_bio(&RSAPublicKey_it, bp, rsa); |
207 | } | 207 | } |
208 | 208 | ||
209 | RSA * | 209 | RSA * |
210 | d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) | 210 | d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa) |
211 | { | 211 | { |
212 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); | 212 | return ASN1_item_d2i_fp(&RSAPublicKey_it, fp, rsa); |
213 | } | 213 | } |
214 | 214 | ||
215 | int | 215 | int |
216 | i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) | 216 | i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa) |
217 | { | 217 | { |
218 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(RSAPublicKey), fp, rsa); | 218 | return ASN1_item_i2d_fp(&RSAPublicKey_it, fp, rsa); |
219 | } | 219 | } |
220 | 220 | ||
221 | RSA * | 221 | RSA * |
@@ -248,25 +248,25 @@ d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa) | |||
248 | DSA * | 248 | DSA * |
249 | d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) | 249 | d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa) |
250 | { | 250 | { |
251 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(DSAPrivateKey), bp, dsa); | 251 | return ASN1_item_d2i_bio(&DSAPrivateKey_it, bp, dsa); |
252 | } | 252 | } |
253 | 253 | ||
254 | int | 254 | int |
255 | i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) | 255 | i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa) |
256 | { | 256 | { |
257 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(DSAPrivateKey), bp, dsa); | 257 | return ASN1_item_i2d_bio(&DSAPrivateKey_it, bp, dsa); |
258 | } | 258 | } |
259 | 259 | ||
260 | DSA * | 260 | DSA * |
261 | d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) | 261 | d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa) |
262 | { | 262 | { |
263 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(DSAPrivateKey), fp, dsa); | 263 | return ASN1_item_d2i_fp(&DSAPrivateKey_it, fp, dsa); |
264 | } | 264 | } |
265 | 265 | ||
266 | int | 266 | int |
267 | i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) | 267 | i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa) |
268 | { | 268 | { |
269 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(DSAPrivateKey), fp, dsa); | 269 | return ASN1_item_i2d_fp(&DSAPrivateKey_it, fp, dsa); |
270 | } | 270 | } |
271 | 271 | ||
272 | DSA * | 272 | DSA * |
@@ -346,52 +346,52 @@ i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey) | |||
346 | X509_SIG * | 346 | X509_SIG * |
347 | d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) | 347 | d2i_PKCS8_bio(BIO *bp, X509_SIG **p8) |
348 | { | 348 | { |
349 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(X509_SIG), bp, p8); | 349 | return ASN1_item_d2i_bio(&X509_SIG_it, bp, p8); |
350 | } | 350 | } |
351 | 351 | ||
352 | int | 352 | int |
353 | i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) | 353 | i2d_PKCS8_bio(BIO *bp, X509_SIG *p8) |
354 | { | 354 | { |
355 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(X509_SIG), bp, p8); | 355 | return ASN1_item_i2d_bio(&X509_SIG_it, bp, p8); |
356 | } | 356 | } |
357 | 357 | ||
358 | X509_SIG * | 358 | X509_SIG * |
359 | d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) | 359 | d2i_PKCS8_fp(FILE *fp, X509_SIG **p8) |
360 | { | 360 | { |
361 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(X509_SIG), fp, p8); | 361 | return ASN1_item_d2i_fp(&X509_SIG_it, fp, p8); |
362 | } | 362 | } |
363 | 363 | ||
364 | int | 364 | int |
365 | i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) | 365 | i2d_PKCS8_fp(FILE *fp, X509_SIG *p8) |
366 | { | 366 | { |
367 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(X509_SIG), fp, p8); | 367 | return ASN1_item_i2d_fp(&X509_SIG_it, fp, p8); |
368 | } | 368 | } |
369 | 369 | ||
370 | PKCS8_PRIV_KEY_INFO * | 370 | PKCS8_PRIV_KEY_INFO * |
371 | d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) | 371 | d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO **p8inf) |
372 | { | 372 | { |
373 | return ASN1_item_d2i_bio(ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), bp, | 373 | return ASN1_item_d2i_bio(&PKCS8_PRIV_KEY_INFO_it, bp, |
374 | p8inf); | 374 | p8inf); |
375 | } | 375 | } |
376 | 376 | ||
377 | int | 377 | int |
378 | i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) | 378 | i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf) |
379 | { | 379 | { |
380 | return ASN1_item_i2d_bio(ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), bp, | 380 | return ASN1_item_i2d_bio(&PKCS8_PRIV_KEY_INFO_it, bp, |
381 | p8inf); | 381 | p8inf); |
382 | } | 382 | } |
383 | 383 | ||
384 | PKCS8_PRIV_KEY_INFO * | 384 | PKCS8_PRIV_KEY_INFO * |
385 | d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) | 385 | d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO **p8inf) |
386 | { | 386 | { |
387 | return ASN1_item_d2i_fp(ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), fp, | 387 | return ASN1_item_d2i_fp(&PKCS8_PRIV_KEY_INFO_it, fp, |
388 | p8inf); | 388 | p8inf); |
389 | } | 389 | } |
390 | 390 | ||
391 | int | 391 | int |
392 | i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) | 392 | i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf) |
393 | { | 393 | { |
394 | return ASN1_item_i2d_fp(ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), fp, | 394 | return ASN1_item_i2d_fp(&PKCS8_PRIV_KEY_INFO_it, fp, |
395 | p8inf); | 395 | p8inf); |
396 | } | 396 | } |
397 | 397 | ||
@@ -477,21 +477,21 @@ X509_verify(X509 *a, EVP_PKEY *r) | |||
477 | { | 477 | { |
478 | if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) | 478 | if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) |
479 | return 0; | 479 | return 0; |
480 | return(ASN1_item_verify(ASN1_ITEM_rptr(X509_CINF), a->sig_alg, | 480 | return(ASN1_item_verify(&X509_CINF_it, a->sig_alg, |
481 | a->signature, a->cert_info, r)); | 481 | a->signature, a->cert_info, r)); |
482 | } | 482 | } |
483 | 483 | ||
484 | int | 484 | int |
485 | X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) | 485 | X509_REQ_verify(X509_REQ *a, EVP_PKEY *r) |
486 | { | 486 | { |
487 | return (ASN1_item_verify(ASN1_ITEM_rptr(X509_REQ_INFO), | 487 | return (ASN1_item_verify(&X509_REQ_INFO_it, |
488 | a->sig_alg, a->signature, a->req_info, r)); | 488 | a->sig_alg, a->signature, a->req_info, r)); |
489 | } | 489 | } |
490 | 490 | ||
491 | int | 491 | int |
492 | NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) | 492 | NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r) |
493 | { | 493 | { |
494 | return (ASN1_item_verify(ASN1_ITEM_rptr(NETSCAPE_SPKAC), | 494 | return (ASN1_item_verify(&NETSCAPE_SPKAC_it, |
495 | a->sig_algor, a->signature, a->spkac, r)); | 495 | a->sig_algor, a->signature, a->spkac, r)); |
496 | } | 496 | } |
497 | 497 | ||
@@ -499,7 +499,7 @@ int | |||
499 | X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) | 499 | X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md) |
500 | { | 500 | { |
501 | x->cert_info->enc.modified = 1; | 501 | x->cert_info->enc.modified = 1; |
502 | return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), | 502 | return (ASN1_item_sign(&X509_CINF_it, |
503 | x->cert_info->signature, x->sig_alg, x->signature, | 503 | x->cert_info->signature, x->sig_alg, x->signature, |
504 | x->cert_info, pkey, md)); | 504 | x->cert_info, pkey, md)); |
505 | } | 505 | } |
@@ -508,7 +508,7 @@ int | |||
508 | X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) | 508 | X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) |
509 | { | 509 | { |
510 | x->cert_info->enc.modified = 1; | 510 | x->cert_info->enc.modified = 1; |
511 | return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CINF), | 511 | return ASN1_item_sign_ctx(&X509_CINF_it, |
512 | x->cert_info->signature, x->sig_alg, x->signature, | 512 | x->cert_info->signature, x->sig_alg, x->signature, |
513 | x->cert_info, ctx); | 513 | x->cert_info, ctx); |
514 | } | 514 | } |
@@ -516,14 +516,14 @@ X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx) | |||
516 | int | 516 | int |
517 | X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) | 517 | X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md) |
518 | { | 518 | { |
519 | return (ASN1_item_sign(ASN1_ITEM_rptr(X509_REQ_INFO), | 519 | return (ASN1_item_sign(&X509_REQ_INFO_it, |
520 | x->sig_alg, NULL, x->signature, x->req_info, pkey, md)); | 520 | x->sig_alg, NULL, x->signature, x->req_info, pkey, md)); |
521 | } | 521 | } |
522 | 522 | ||
523 | int | 523 | int |
524 | X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) | 524 | X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx) |
525 | { | 525 | { |
526 | return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_REQ_INFO), | 526 | return ASN1_item_sign_ctx(&X509_REQ_INFO_it, |
527 | x->sig_alg, NULL, x->signature, x->req_info, ctx); | 527 | x->sig_alg, NULL, x->signature, x->req_info, ctx); |
528 | } | 528 | } |
529 | 529 | ||
@@ -531,7 +531,7 @@ int | |||
531 | X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) | 531 | X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md) |
532 | { | 532 | { |
533 | x->crl->enc.modified = 1; | 533 | x->crl->enc.modified = 1; |
534 | return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CRL_INFO), x->crl->sig_alg, | 534 | return(ASN1_item_sign(&X509_CRL_INFO_it, x->crl->sig_alg, |
535 | x->sig_alg, x->signature, x->crl, pkey, md)); | 535 | x->sig_alg, x->signature, x->crl, pkey, md)); |
536 | } | 536 | } |
537 | 537 | ||
@@ -539,14 +539,14 @@ int | |||
539 | X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) | 539 | X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx) |
540 | { | 540 | { |
541 | x->crl->enc.modified = 1; | 541 | x->crl->enc.modified = 1; |
542 | return ASN1_item_sign_ctx(ASN1_ITEM_rptr(X509_CRL_INFO), | 542 | return ASN1_item_sign_ctx(&X509_CRL_INFO_it, |
543 | x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); | 543 | x->crl->sig_alg, x->sig_alg, x->signature, x->crl, ctx); |
544 | } | 544 | } |
545 | 545 | ||
546 | int | 546 | int |
547 | NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) | 547 | NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md) |
548 | { | 548 | { |
549 | return (ASN1_item_sign(ASN1_ITEM_rptr(NETSCAPE_SPKAC), | 549 | return (ASN1_item_sign(&NETSCAPE_SPKAC_it, |
550 | x->sig_algor, NULL, x->signature, x->spkac, pkey, md)); | 550 | x->sig_algor, NULL, x->signature, x->spkac, pkey, md)); |
551 | } | 551 | } |
552 | 552 | ||
@@ -565,7 +565,7 @@ int | |||
565 | X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, | 565 | X509_digest(const X509 *data, const EVP_MD *type, unsigned char *md, |
566 | unsigned int *len) | 566 | unsigned int *len) |
567 | { | 567 | { |
568 | return (ASN1_item_digest(ASN1_ITEM_rptr(X509), type, (char *)data, | 568 | return (ASN1_item_digest(&X509_it, type, (char *)data, |
569 | md, len)); | 569 | md, len)); |
570 | } | 570 | } |
571 | 571 | ||
@@ -573,7 +573,7 @@ int | |||
573 | X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, | 573 | X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, unsigned char *md, |
574 | unsigned int *len) | 574 | unsigned int *len) |
575 | { | 575 | { |
576 | return (ASN1_item_digest(ASN1_ITEM_rptr(X509_CRL), type, (char *)data, | 576 | return (ASN1_item_digest(&X509_CRL_it, type, (char *)data, |
577 | md, len)); | 577 | md, len)); |
578 | } | 578 | } |
579 | 579 | ||
@@ -581,7 +581,7 @@ int | |||
581 | X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, | 581 | X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, unsigned char *md, |
582 | unsigned int *len) | 582 | unsigned int *len) |
583 | { | 583 | { |
584 | return (ASN1_item_digest(ASN1_ITEM_rptr(X509_REQ), type, (char *)data, | 584 | return (ASN1_item_digest(&X509_REQ_it, type, (char *)data, |
585 | md, len)); | 585 | md, len)); |
586 | } | 586 | } |
587 | 587 | ||
@@ -589,7 +589,7 @@ int | |||
589 | X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, | 589 | X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, unsigned char *md, |
590 | unsigned int *len) | 590 | unsigned int *len) |
591 | { | 591 | { |
592 | return (ASN1_item_digest(ASN1_ITEM_rptr(X509_NAME), type, (char *)data, | 592 | return (ASN1_item_digest(&X509_NAME_it, type, (char *)data, |
593 | md, len)); | 593 | md, len)); |
594 | } | 594 | } |
595 | 595 | ||
@@ -597,7 +597,7 @@ int | |||
597 | PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, | 597 | PKCS7_ISSUER_AND_SERIAL_digest(PKCS7_ISSUER_AND_SERIAL *data, |
598 | const EVP_MD *type, unsigned char *md, unsigned int *len) | 598 | const EVP_MD *type, unsigned char *md, unsigned int *len) |
599 | { | 599 | { |
600 | return(ASN1_item_digest(ASN1_ITEM_rptr(PKCS7_ISSUER_AND_SERIAL), type, | 600 | return(ASN1_item_digest(&PKCS7_ISSUER_AND_SERIAL_it, type, |
601 | (char *)data, md, len)); | 601 | (char *)data, md, len)); |
602 | } | 602 | } |
603 | 603 | ||